987 resultados para functional identity
Resumo:
Having personal that works in projects but belongs to a functional organization is the way that many companies organized their labor force today. Previous research shows that this implies management contradictions and ambiguities between functional manager and project manager; there are unresolved struggles between these two roles in terms of power, accountability, authority and legitimacy. With this paper we aim to analyze those struggles based on previous research and to generate working hypotheses. We first provide a review of the different matrix organizations focusing on the relation between the functional manager and the project manager. We then review the literature concerning temporary organizations and projects as temporary organizations. We conclude by integrating the findings of these perspectives and by identifying working hypotheses and areas for further research.
Resumo:
"Defrauding land titles systems impacts upon us all. Those who deal in land include ordinary citizens, big business, small business, governments, not-for-profit organisation, deceased estates...Fraud here touches almost everybody." the thesis presented in this paper is that the current and disparate steps taken by jurisdictions to alleviate land fraud associated with identity-based crimes are inadequate. The centrepiece of the analysis is the consideration of two scenarios that have recently occurred. One is the typical scenario where a spouse forges the partner's signature to obtain a mortgage from a financial institution. The second is atypical. It involves a sophisticated overseas fraud duping many stakeholders involved in the conveyancing process. After outlining these scenarios, we will examine how identity verification requirements of the United Kingdom, Ontario, the Australian states, and New Zealand would have been applied to these two frauds. Our conclusion is that even though some jurisdictions may have prevented the frauds from occurring, the current requirements are inadequate. We use the lessons learnt to propose what we consider core principles for identity verification in land transactions.
Resumo:
The development of the Australian Curriculum has reignited a debate about the role of Australian literature in the contexts of curricula and classrooms. A review of the mechanisms for promoting Australian literature including literary prizes, databases, surveys and texts included for study in senior English classrooms in New South Wales and Victoria provides a background for considering the purpose of Australian texts and the role of literature teachers in shaping students’ engagement with literature.
Resumo:
A higher degree of mineralization is found within scaffold groups implanted with cells compared to scaffold alone demonstrating greater bone regenerative potential of cell-scaffold constructs Tissue engineered bone analysed using ESEM and SAXS demonstrates bone formation within the scaffold to be preferentially aligned around the scaffold struts. The mineral particles are not shown to orientate around the osteons within the native bone.
Resumo:
The World Wide Web constitutes one of the most important inventions of the late 20th century: it has changed culture, society, business, communication, politics, and many other fields of human endeavour, not least also by providing a more user-friendly pathway of access to its major underlying technology, the Internet itself. Key phases in its development can be charted, especially by how it has been used to present and share information – and here, the personal or professional, private or official homepage stands in as a useful representation of wider Web trends overall. From hand-coded beginnings through several successive stages of experimentation and standardisation, to the shifting balance between personal sites and social networks, the homepage demonstrates how the Web itself, and its place in our lives, have changed.
Resumo:
Digital Stories are short autobiographical documentaries, often illustrated with personal photographs and narrated in the first person, and typically produced in group workshops. As a media form they offer ‘ordinary people’ the opportunity to represent themselves to audiences of their choosing; and this amplification of hitherto unheard voices has significant repercussions for their social participation. Many of the storytellers involved in the ‘Rainbow Family Tree’ case study that is the subject of this paper can be characterised as ‘everyday’ activists for their common desire to use their personal stories to increase social acceptance of marginalised identity categories. However, in conflict with their willingness to share their personal stories, many fear the risks and ramifications of distributing them in public spaces (especially online) to audiences both intimate and unknown. Additionally, while technologies for production and distribution of rich media products have become more accessible and user-friendly, many obstacles remain. For many people there are difficulties with technological access and aptitude, personal agency, cultural capital, and social isolation, not to mention availability of the time and energy requisite to Digital Storytelling. Additionally, workshop context, facilitation and distribution processes all influence the content of stories. This paper explores the many factors that make ‘authentic’ self-representation far from straight forward. I use qualitative data drawn from interviews, Digital Story texts and ethnographic observation of GLBTQIS participants in a Digital Storytelling initiative that combined face-to-face and online modes of participation. I consider mediating influences in practice and theory and draw on strategies put forth in cultural anthropology and narrative therapy to propose some practical tools for nuanced and sensitive facilitation of Digital Storytelling workshops and webspaces. Finally, I consider the implications of these facilitation strategies for voice, identity and social participation.
Resumo:
What psychological function does brand loyalty serve? Drawing on Katz’s (1960) Functional Theory of Attitudes, we propose that there are four functions (or motivational antecedents) of loyalty: utilitarian, knowledge, value-expressive and ego-defensive. We discuss how each function relates to the three dimensions of loyalty (i.e. emotional, cognitive, and behavioural loyalty). Then this conceptualisation of brand loyalty is explored using four consumer focus groups. These exploratory results demonstrate that the application of a functional approach to brand loyalty yields insights which have not been apparent in previous research. More specifically, this paper notes insights in relation to brand loyalty from a consumer’s perspective, including the notion that the ego-defensive function is an orientation around what others think and feel. This creates the possibilities for future research into brand loyalty via social network analysis, in order to better understand how the thoughts of others affect consumers’ loyalty attributes. --------------------------------------------------------------------------------
Resumo:
A review of the 6th APT focusing on the work and performance of Rohan Wealleans
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
Currently there is confusion about the value of using nutritional support to treat malnutrition and improve functional outcomes in chronic obstructive pulmonary disease (COPD). This systematic review and meta-analysis of randomised controlled trials (RCTs) aimed to clarify the effectiveness of nutritional support in improving functional outcomes in COPD. A systematic review identified 12 RCTs (n = 448) in stable COPD patients investigating the effects of nutritional support [dietary advice (1 RCT), oral nutritional supplements (ONS; 10 RCTs), enteral tube feeding (1 RCT)] versus control on functional outcomes. Meta-analysis of the changes induced by intervention found that whilst respiratory function (FEV(1,) lung capacity, blood gases) was unresponsive to nutritional support, both inspiratory and expiratory muscle strength (PI max +3.86 SE 1.89 cm H(2) O, P = 0.041; PE max +11.85 SE 5.54 cm H(2) O, P = 0.032) and handgrip strength (+1.35 SE 0.69 kg, P = 0.05) were significantly improved, and associated with weight gains of ≥ 2 kg. Nutritional support produced significant improvements in quality of life in some trials, although meta-analysis was not possible. It also led to improved exercise performance and enhancement of exercise rehabilitation programmes. This systematic review and meta-analysis demonstrates that nutritional support in COPD results in significant improvements in a number of clinically relevant functional outcomes, complementing a previous review showing improvements in nutritional intake and weight.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
Purpose In this study we examine neuroretinal function in five amblyopes, who had been shown in previous functional MRI (fMRI) studies to have compromised function of the lateral geniculate nucleus (LGN), to determine if the fMRI deficit in amblyopia may have its origin at the retinal level. Methods We used slow flash multifocal ERG (mfERG) and compared averaged five ring responses of the amblyopic and fellow eyes across a 35 deg field. Central responses were also assessed over a field which was about 6.3 deg in diameter. We measured central retinal thickness using optical coherence tomography. Central fields were measured using the MP1-Microperimeter which also assesses ocular fixation during perimetry. MfERG data were compared with fMRI results from a previous study. Results Amblyopic eyes had reduced response density amplitudes (first major negative to first positive (N1-P1) responses) for the central and paracentral retina (up to 18 deg diameter) but not for the mid-periphery (from 18 to 35 deg). Retinal thickness was within normal limits for all eyes, and not different between amblyopic and fellow eyes. Fixation was maintained within the central 4° more than 80% of the time by four of the five participants; fixation assessed using bivariate contour ellipse areas (BCEA) gave rankings similar to those of the MP-1 system. There was no significant relationship between BCEA and mfERG response for either amblyopic or fellow eye. There was no significant relationship between the central mfERG eye response difference and the selective blood oxygen level dependent (BOLD) LGN eye response difference previously seen in these participants. Conclusions Retinal responses in amblyopes can be reduced within the central field without an obvious anatomical basis. Additionally, this retinal deficit may not be the reason why the LGN BOLD (blood oxygen level dependent) responses are reduced for amblyopic eye stimulation.